Basic Configuration of Cisco 2600 Router
Basic Configuration of Cisco 2600 Router
I decided to incorporate the Cisco 2600 into my previously designed network. This would give me two seperate broadcast domains for future
additions to the network, as well as a NAT point to prevent interfering with other machines on the school network due to IP address conflicts. I
had already configured a Server 2008 box with AD DS and NPS, as well as a Firebox X Edge firewall. Thus the topology would look like this:
2 Basic Configuration of Cisco 2600 Router
The first step is to clear out the configuration of the Cisco 2600. I used a Serial connection to the console port of the 2600 with putty:
3 Basic Configuration of Cisco 2600 Router
Typing the following commands will reset the cisco to its default settings.
The router will then restart with the default settings. I recommend unplugging all networking cables at this point until you are done with the
basic configuration.
You'll see information about the router's built in hardware, such as interfaces and memory. Eventually you'll see this:
4 Basic Configuration of Cisco 2600 Router
The first step is to enter Privileged EXEC mode, essentially the administrative mode:
Using the exit or end command will go back to the previous configuration prompt, when you exit configuration mode, it writes the changes:
I set the clock, which is important for logging functions and other things:
5 Basic Configuration of Cisco 2600 Router
Now for the fun stuff: Configuring and enabling the interfaces:
As you can see, all interfaces are down and they are currently disconnected physically as well. You need these names to configure the interfaces
though. Enter config mode:
And the default name server, which would likely be an internal DNS but google for this example:
6 Basic Configuration of Cisco 2600 Router
We can fix this problem by using this command from the externals interface prompt:
7 Basic Configuration of Cisco 2600 Router
Now that both interfaces are up and the gateway and DNS are configured, I connected the cat5 cables to the interfaces. I pinged the internal
firewall: 10.16.70.2, and the external firewall: 172.16.0.1.
9 Basic Configuration of Cisco 2600 Router
So we can see that the server cannot ping the last firewall, but we saw previously that the Cisco router can. This is why we need to set up NAT.
Lets go back to the interface configs for the two interfaces we are using:
This takes a bit of explaining. NAT allows us to automatically translate IP addresses based on certain criteria, which could be specific ports,
addresses, etc. I chose a simple static NAT, which in this case will simply route all traffic recieved internally to the external interface using the
external IP. The IP address I used is the external of the firewall, which means all traffic coming from the firewall is routed out of the external
interface of the Cisco as shown.
This NAT works for this simple experiment, but would require a more complex configuration in most real world deployments. There is a catch to
this setup I will show you soon.
First, lets verify all of our configuration settings with the show ip NAT translation command:
11 Basic Configuration of Cisco 2600 Router
It is configured properly, so lets test again with our server by pinging the external firewall:
And for the catch, and why a more advanced configuration would be necessary outside of my test network:
The Cisco can no longer ping the firewall, because the return pings are routed out of the internal interface, however this is acceptable for this
test network. As I expand I may change this to a dynamic NAT that only NATs web traffic.